You can tell we’re in the last 10-12 days of the year when we start seeing all sorts of year end retrospectives, year’s in review, countdowns of the top ___ of ___year ending___. Well, spyware has seen a banner year in many respects and Suzi at Spyware Confidential has a rundown of the top 10 tricks used in 2005.
Here’s a brief highlight…
10. Spyware spread through Windows Media files
9. Adware companies hide their dirty work using rootkit technology
8. Internet Explorer infected through Firefox
7. Direct Revenue unleashed Aurora
6. Spam bots, keyloggers, kiddie porn connect with major adware companies
5. Spazbox domain installs massive spyware/adware – using IRC
4. Anti-spyware spread by spyware and trojans
3. Direct Revenue adware distributed through BitTorrent
2. AIM worm carries backdoor, rootkit and adware, found to be powered by world wide bot net with ties to the Middle East.
1. Sony BMG infects users with DRM rootkit
What’s distressing is that I’m sure we haven’t seen the last of these tricks… In fact given the traction that some of the rogues have made with #4 above… that may be a favored vector this coming year. I’m sure that we’ll also see other, new tactics.
Earlier this afternoon I did some work for someone that had just recently got a new DSL connection. (And Symantec Internet Security 2006). She had got tons of messenger popup spam. (LAN connection was firewalled, but the PPPoE wasn’t..(?)) Anyway, she was confused about why Symantec would be popping up asking her to download win-fix for $49… So even some of the old vectors are still common. Fortunately she didn’t bite… (and now everything is firewalled and several services are disabled.
Related PostsRelated Posts
- How to Remove APCSecure | APCSecure Removal Guide APCSecure is yet another rogue antivirus application from the prolific and annoying wini family of rogues. This particular variant also comes with a rootkit called TDL3. Trojans are used to promote this rogue antivirus and you will likely find that it will create multiple empty files on your computer that......
- Huge identity theft ring discovered by spyware research Sunbelt blog, reports that they have uncovered a MASSIVE amount of personal data, ranging from usernames to passwords to banking information and much more while investigating spyware. They found keylogger transcript software with lots of personal information. Sunbelt develops software to protect against spam and spyware and other security threats.......
- Wordpress 2.0 plugins One of the real hesitations I had in moving current sites to Wordpress 2.0 was the thought of "what plugins will break?" From what I saw the supported plugins list was short and so was the "broken" plugins list. Which said many were likely untested. So, after I installed a......
- Planning For Retirement Late in Life Not all of us have had the luxury of spending the last 20 years to secure our financial future. Most of the time, through no fault of our own, putting aside money for retirement takes a back seat to handling emergencies or schooling for our kids, or simply the daily......
- Biblical Contradiction: Good works should be seen or hidden: Biblical Contradiction Explained: Good works should be seen or hidden: Good works should be hidden: “Beware of practicing your righteousness before men to be noticed by them; otherwise you have no reward with your Father who is in heaven. Matthew 6:1 Good works should be seen: Let your light shine......
- Renting College Textbooks Cuts Higher Education Costs Up To 75% As if the cost of college tuition wasn't prohibitive enough, the most basic of college essentials - the college textbook - has steadily been increasing over the last 2 decades. According to data published by the General Accountability Office (GAO), the price of college textbooks has risen an average......
- Botnets and spyare
- Looks as though the FTC has broken up a spyware ring
- Spyware news and musings
- Network Security guide for the home or small business network – Part 18 – What about Dialup Users?
- AIM worm